Abstract
The INSPIRE project aims at enhancing the European potential in the field of security by ensuring the protection of critical information infrastructures through (a) the identification of their vulnerabilities and (b) the development of innovative techniques for securing networked process control systems. To increase the resilience of such systems INSPIRE will develop traffic engineering algorithms, diagnostic processes and self-reconfigurable architectures along with recovery techniques. Hence, the core idea of the INSPIRE project is to protect critical information infrastructures by appropriately configuring, managing, and securing the communication network which interconnects the distributed control systems. A working prototype will be implemented as a final demonstrator of selected scenarios. Controls/Communication Experts will support project partners in the validation and demonstration activities. INSPIRE will also contribute to standardization process in order to foster multi-operator interoperability and coordinated strategies for securing lifeline systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Seungtaek, O., et al.: Closed P2P system for PVR-based file sharing. IEEE Transactions on Consumer Electronics 51(3) (2005)
Keong, L., et al.: A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys and Tutorials (2005)
Wallach, D.S.: A survey of peer-to-peer security issues. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 42–57. Springer, Heidelberg (2003)
Liang, J., Naoumov, N., Ross, K.: The Index Poisoning Attack on P2P File-Sharing Systems. In: Proc. of INFOCOM 2006 (2006)
P2P or Peer-to-Peer Safety, Privacy and Security. Federal Trade Commission (2004), http://www.ftc.gov/os/comments/p2pfileshare/OL-100005.pdf
Risson, J., Moors, T.: Survey of Research towards Robust Peer-to-Peer Networks: Search Methods. Technical Report UNSW-EE-P2P-1-1, University of New South Wales, Sydney (2004)
Mudhakar, S., Ling, L.: Vulnerabilities and security threats in structured overlay networks: A quantitative analysis. In: Proc. of the 20th Annual Computer Security Applications Conference (ACSAC) (2004)
Honghao, W., Yingwu, Z., Yiming, H.: An efficient and secure peer-to-peer overlay network. In: Proc. of the IEEE Conference on Local Computer Networks (2005)
Friedman, A., Camp, J.: Peer-to-Peer Security, Harvard University (2003), http://allan.friedmans.org/papers/P2Psecurity.pdf
Duma, C., Shahmehri, N., Turcan, E.: Resilient Trust for Peer-to-Peer Based Critical Information Infrastructures. In: Proceedings of 2nd International Conference on Critical Infrastructures (CRIS) (2004)
Mongardi, G.: Dependable Computing for Railway Control Systems. In: Proceedings of DCCA-3, Mondello, Italy, pp. 255–277 (1993)
Bondavalli, A., Chiaradonna, S., Di Giandomenico, F., Grandoni, F.: Threshold-Based Mechanisms to Discriminate Transient from Intermittent Faults. IEEE Transactions on Computers 49, 230–245 (2000)
Mirkovic, J., Martin, J., Reiher, P.: A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms. UCLA Computer Science Department, Technical report N.020018
Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
Goswami, K.K., Iyer, R.K.: Simulation of Software Behavior Under Hardware Faults. In: Proceedings of the 23rd Annual International Symposium on Fault-Tolerant Computing (1993)
Iyer, R.K., Tang, D.: Experimental Analysis of Computer System Fault Tolerance. In: Pradhan, D.K. (ed.) Fault-Tolerant Computer System Design, ch. 5. Prentice Hall Inc., Englewood Cliffs (1996)
Cassidy, K.J., Gross, K.C., Malekpour, A.: Advanced Pattern Recognition for Detection of Complex Software Aging Phenomena in Online Transaction Processing Servers. In: Proceedings of International Conference on Dependable Systems and Networks (2002)
Huang, Y., Kintala, C.M.R., Kolettis, N., Fulton, N.D.: Software Rejuvenation: Analysis, Module and Applications. In: FTCS 1995, pp. 381–390 (1995)
Campanile, F., Cilardo, A., Coppolino, L., Romano, L.: Adaptable Parsing of Real-Time Data Streams. In: Proceedings of 15th Euromicro International Conference on Parallel, Distributed, and Network-based Processing (PDP 2007) (February 2007)
Borealis Distributed Stream Processing Engine, http://www.cs.brown.edu/research/borealis/public/
Serafini, M., Bondavalli, A., Suri, N.: On-Line Diagnosis and Recovery: On the Choice and Impact of Tuning Parameters. IEEE Transactions on Dependable and Secure Computing (October 2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
D’Antonio, S., Romano, L., Khelil, A., Suri, N. (2009). INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project. In: Setola, R., Geretshuber, S. (eds) Critical Information Infrastructure Security. CRITIS 2008. Lecture Notes in Computer Science, vol 5508. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03552-4_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-03552-4_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03551-7
Online ISBN: 978-3-642-03552-4
eBook Packages: Computer ScienceComputer Science (R0)